Show Less
You do not have access to this content

Information Sovereignty

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

This thought-provoking work elaborates on the assumption that information privacy is, in its essence, comparable to information sovereignty. This seemingly rudimentary observation serves as the basis for an analysis of various information instruments in domestic and international law. It also provides for the method to resolve situations where informational domains of individuals and/or states collide. Information Sovereignty combines a philosophical and methodological analysis of the phenomena of information, sovereignty and privacy. It also encompasses more practical discussions of cybersecurity and cross-border processing of personal data, including in the context of cross-border discovery of digital evidence.
Show Summary Details
This content is available to you

Bibliography

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

Books

Adorno, TW, The Culture Industry (Routledge, 2003)

Aristotle, Metaphysics (McMahon trans, JH Dover Publications, 2007)

Austin, J, The Province of Jurisprudence Determined (John Murray, 1832)

Bettinger T and A Waddell, Domain name law and practice: an international handbook (Oxford University Press, 2007)

Bogdan, M, Private International Law as Component of the Law of the Forum (Hague Academy of International Law, 2012)

Bygrave, LA, Data Privacy Law: An International Perspective (Oxford University Press, 2014)

Chase, O, Law, Culture and Ritual (New York University Press, 2005)

Colonna, L, Legal Implications of Data Mining: Assessing the European Union’s Data Protection Principles in Light of the United States Government’s National Intelligence Data Mining Practices (Ragulka förlag, 2016)

Crawford, J, Brownlie’s Principles of Public International Law (Oxford University Press, 8th edn, 2012)

Darwin, C, The Foundations of the Origin of Species – Two Essays Written in 1842 and 1844 (F Darwin ed, The University Press, 1909)

Davies, M, A Bell and P Brereton, Nygh’s Conflict of Laws in Australia (Butterworths, 9th edn, 2014)

Dreier, R and S Paulson, Gustav Radbruch – Rechtsphilosophie: Studienausgabe (CF Müller, 1999)

Dworkin, R, Justice for Hedgehogs (Harvard University Press, 2011)

Dworkin, R, Taking Rights Seriously (Bloomsbury, 1997)

Fischer, EA, Creating a National Framework for Cybersecurity: An Analysis of Issues and Options (Nova Science Publishers, 2009)

Floridi, L, The Philosophy of Information (Oxford University Press, 2011)

Fox, James R, Dictionary of International and Comparative Law (Oceana Publications Inc, 2nd edn, 1997)

Freiling, FC, G Hornung and R Pol|$$|Ahcák (eds), Forensic Computing – report from Dagstuhl Seminar 13482 (Dagstuhl Publishing, 2014)

Fuchs, C, Internet and Society – Social Theory in the Information Age (Routledge, 2008)

Fuller, L, The Morality of Law (Yale University Press, rev edn, 1969)

Glenn, HP, Legal Traditions of the World – Sustainable Diversity in Law (Oxford University Press, 5th edn, 2014)

Geers. K (ed), Cyber War in Perspective: Russian Aggression against Ukraine (CCD CoE, 2015)

Gödel, KF, On Formally Undecidable Propositions of Principia Mathematica and Related Systems (Dover Publications, 1993)

Gordilo, L, Interlocking Constitutions – Towards an Interordinal Theory of National, European and UN Law (Hart Publishing, 2012)

Grotius, H, Hugo Grotius on the Law of War and Peace (SC Neff ed, Cambridge University Press, 2012)

Hobbes, T, Leviathan, Or the Matter, Forme, & Power of a Common-Wealth, Ecclesiastical and Civill (Project, 2009) e-book No 3207

Hörnle, J, Cross-border Internet Dispute Resolution (Cambridge University Press, 2009)

Hume, D, A Treatise on Human Nature (1739), republished by Project Gutenberg at gutenberg.org as book No 4705

Jellinek, G, Allgemenine Staatslehre (Verlag O Häring, 1917)

Jhering, R, The Struggle for Law (JJ Lalor trans, Callaghan and Co, 2nd edn, 1915)

Kant, I, Groundwork for the Metaphysics of Morals (Jonathan Bennett trans, Early Modern Texts online, 2010) <http://www.earlymoderntexts.com/assets/pdfs/kant1785.pdf>

Kant, I, To Perpetual Peace (T Humprey trans, Hackett Publishing Company, 2003)

Kant, I, Perpetual Peace – A Philosophical Essay (MC Smith trans, George Allen & Unwin Ltd, 1795) republished by Online Library of Liberty (oll.libertyfund.org) as title No 357

Kelsen, H, Introduction to the Problems of Legal Theory (SL Paulson and B Litschewski Paulson trans, Clarendon Press, 1997)

Kelsen, H, Pure Theory of Law (M Knight trans, University of California Press, 1967); also available in full text at books.google

Kennedy, E, Constitutional Failure – Carl Schmitt in Weimar (Duke University Press, 2004)

Kohl, U, Jurisdiction and the Internet (Cambridge University Press, 2007)

Kuner, C, European Data Privacy and Online Business (Oxford University Press, 2003)

Lanier, J, Who Owns the Future? (Simon & Schuster, 2013)

Lee, N, Counterterrorism and Cybersecurity – Total Information Awareness (Springer, 2013)

Lessig, L, Code and Other Laws of Cyberspace (Basic Books, 2nd edn, 2006)

Lessig, L, Freeculture (The Penguin Press, 2004)

Lessig, L, The Future of Ideas – The Fate of the Commons in a Connected World (Vintage Books, 2002)

Lessig, L, Code and Other Laws of Cyberspace (Basic Books, 1999)

Lévy, P, Becoming Virtual – Reality in the Digital Age (Plenum Trade, 2002)

Lieven, D, Empire – The Russian Empire and its Rivals (Yale University Press, 2001)

Lindsay, D, International domain name law: ICANN [Internet Corporation for Assigned Names and Numbers] and the UDRP (Hart Publishing, 2007)

Llewellyn, K, Some Lectures on Law and its Study (Columbia University School of Law, 1930)

Locke, J, Second Treatise of Government (CB McPherson ed, Hackett Publishing Company, 1980); republished by Project Gutenberg at gutenberg.org as book No 7370

MacCormick, N and O Weinberger, An Institutional Theory of Law – New Approaches to Legal Positivism (D Reidel Publishing Company, 1986)

Matsuda, Y, The Information Society as Post-Industrial Society (World Future Society, 1981)

May, C, The Information Society – A Sceptical View (Blackwell Publishers, 2002)

Mortensen, R, R Garnett and M Keyes, Private International Law in Australia (LexisNexis, Chatswood, 3rd edn, 2015)

Noortmann, M, A Reinisch and C Ryngaert (eds), Non-State Actors in International Law (Hart Publishing, 2015)

Nozick, R, Anarchy, State and Utopia (Basic Books, 1975).

Ohly, A, Volenti non fit iniuria – Die Einwilligung im Privatrecht (Paul Siebeck, 2002)

Ovid (Publius Ovidius Naso), Metamorphoses, Book the First ((S Garth (ed); J Dryden, A Pope, J Addison and W Congreve trans) (J Tonson, 1717)

Paliwala, AA, History of Legal Informatics (Prensas de Universitarias de Zaragoza, 2010)

Pashukanis, EB, Law and Marxism: a general theory (Pluto Press, 1983)

Plato, Laws (B Jowett trans, Project Gutenberg, 2008) e-book No 1750

Podgorecki, A and V Olgiati, Totalitarian and Post-totalitarian Law (Dartmouth, 1996)

Polčák, R, Internet a Promeny Prava (Auditorium, 2012)

Ponte, LM and TD Cavenagh, Cyberjustice: Online Dispute Resolution (ODR) for E-Commerce (Prentice-Hall, 2004)

Potter, EH (ed), Cyber-Diplomacy – Managing Foreign Policy in the Twenty-first Century (McGill-Queen’s University Press, 2002)

Reynolds, FMB, Lex mercatoria: essays on international commercial law in honour of Francis Reynolds (LLP, 2000)

Rounding, V, Catherine the Great – Love, Sex and Power (Macmillan, 2008)

Ryngaert, C, Jurisdiction in International Law (Oxford University Press, 2nd edn, 2015)

Saint-Exupéry, A, The Little Prince (Unabridged with Large Illustrations, 70th Anniversary edn) (CreateSpace Independent Publishing Platform, 2015)

Schmitt, C, Constitutional Theory (J Seitzer trans, Duke University Press, 2008)

Schmitt MN (ed), Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press, 2013)

Schrödinger, E, What is Life? The Physical Aspect of the Living Cell (The University Press, 1944)

Solove, D, The Future of Reputation – Gossip, Rumour and Privacy on the Internet (Yale University Press, 2007)

Solove, DJ and PM Schwartz, Information Privacy Law (Wolters Kluwer, 4th edn, 2011)

Somolová, K, Green widows as a phenomenon of a current society (Univerzita Karlova (diplomová práce), 2009)

Susskind, R, The End of Lawyers? Rethinking the Nature of Legal Services (Oxford University Press, 2008)

Svantesson, D, Private International Law and the Internet (Kluwer Law International, 3rd edn, 2016)

Svantesson, D, Extraterritoriality in Data Privacy Law (Ex Tuto Publishing, 2013)

Vardoulakis, D, Sovereignty and its Order – Toward the Dejustification of Violence (Fordham University Press, 2013)

Weinberger, O, Alternative Action Theory (Kluwer Academic Publishers, 1998)

Weinberger, O, Law, Institutions and Legal Politics (Kluwer Academic Publishers, 1991)

Weinreb, LL, Legal Reason – The Use of Analogy in Legal Argument (Cambridge University Press, 2005)

Wiener, N, Cybernetics: or Control and Communication in the Animal and the Machine (MIT Press, 2nd edn, 1965)

Wilhelm, AG, Digital Nation – Towards an Inclusive Information Society (MIT Press, 2004)

Wittgenstein, L, Tractatus Logico-Philosophicus (B Russel ed, CK Ogden trans, Project Gutenberg, 2010)

Wolff, HI, Roman Law – An Historical Introduction (University of Oklahoma Press, 1951)

Zimmermann, R, The Law of Obligations: Roman Foundations of the Civilian Tradition (Oxford University Press, 1996)

Chapters in Books

Albrecht, JP, ‘Regaining Control and Sovereignty in the Digital Age’ in D Wright and P De Hert (eds), Enforcing Privacy: Regulatory, Legal and Technological Approaches (Springer, 2016)

Bing, J, ‘Building Cyberspace: A Brief History of Internet’ in L Bygrave and J Bing, Internet Governance (Oxford University Press, 2009)

Bobbitt, P, ‘Public International Law’ in DM Patterson (ed), A Companion to Philosophy of Law and Legal Theory (Blackwell Publishers, 1996)

De Vries, K, R Bellanova and P De Hert, ‘The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn’t it?)’ in S Gutwith, Y Poullet, P De Hert and R Leenes (eds), Computers, Privacy and Data Protection: An Element of Choice (Springer, 2011)

Endicott, T, ‘The Logic of Freedom and Power’ in S Besson and J Tasioulas (eds), The Philosophy of International Law (Oxford University Press, 2010)

Harding, C and CL Lim, ‘The Significance of Westphalia: An Archaeology of the International Legal Order’ in C Harding and CL Lim (eds), Essays and Commentary on the European and Conceptual Foundations of Modern International Law (Kluwer Law International, 1999)

Kleve, P and R De Mulder, ‘Code is Murphy’s Law’ in Cyberspace 2005 (Masarykova univerzita, 2006)

Kumm, M and AD Walen, ‘Human Dignity and Proportionality: Pluralism in Balancing’ in G Huscroft, BW Miller and G Webber (eds), Proportionality and the Rule of Law: Rights, Justification, Reasoning (Cambridge University Press, 2014)

Luban, D, ‘Human Rights Pragmatism and Human Dignity’ in M Renzo, R Cruft and S M Liao (eds), Philosophical Foundations of Human Rights (Oxford University Press, 2015)

Möller, K, ‘Proportionality and Rights Inflation’ in G Huscroft, BW Miller and G Webber (eds), Proportionality and the Rule of Law: Rights, Justification, Reasoning (Cambridge University Press, 2014)

Olivecrona, K, ‘Legal Language and Reality’ in RA Newman (ed), Essays in Jurisprudence in Honor of Roscoe Pound (Bobbs-Merrill, 1962)

Polčák, R, ‘Lex Informatica – die Zwecke des Rechts und die Zukunft der Informationsnetze’ in V Zoufaly, XX. Karlsbader Juristentage (Leges, 2012) 

Rolston III, H, ‘Human Uniqueness and Human Dignity: Persons in Nature and the Nature of Persons’ in ED Pellegrino, A Schulman and TW Merrill (eds), Human Dignity and Bioethics (University of Notre Dame Press, 2009)

Sartor, G, ‘The Right to be Forgotten: Dynamics of Privacy and Publicity’ in L Floridi, Protection of Information and the Right to Privacy – a New Equilibrium? (Springer, 2014)

Saxby, S, ‘The Role of Government in National/International Internet Administration’ in Y Akdeniz, C Walker and D Wall, The Internet, Law and Society (Pearson Education Ltd, 2000)

Steinberger, H, ‘Sovereignty’ in Rudolf Bernhardt (ed), Encyclopaedia of Public International Law (North-Holland Publishing Company, 1987) Vol 10

Sulek, D and M Doscher, ‘Beyond Public-Private Partnerships: Leadership Strategies for Securing Cyberspace’ in K Andreasson (ed), Cybersecurity – Public Sector Threats and Responses (Taylor & Francis, 2012)

Svantesson, D, ‘Enforcing Privacy Across Different Jurisdictions’ in D Wright and P De Hert (eds), Enforcing Privacy: Regulatory, Legal and Technological Approaches (Springer, 2016)

Thomas, D, ‘Criminality on the Electronic Frontier’ in D Thomas and BD Loader (eds), Cybercrime (Routledge, 2003)

Thoreau, HD, ‘Civil Disobedience’ in HA Bedau (ed), Civil Disobedience in Focus (Routledge, 1991)

Van Boom, WH and JHM Van Erp, ‘Electronic Highways: On the Road to Liability’ in VJJM Bekkers, B-J Koops and S Nouwt (eds), Emerging Electronic Highways: New Challenges for Politics and Law (Kluwers Law International, 1996)

von Der Pfordten, D, ‘Some Remarks on the Concept of Human Dignity’ in W Brugger and S Kirste (eds), Human Dignity as a Foundation of Law (Franz Steiner Verlag, 2013)

von Wright, H, ‘Value, Norm and Action in My Philosophical Writings’ in G Meggle (ed), Actions, Norms, Values (De Gruyter, 1998)

von Wright, H, ‘Is and Ought’ in E Bulzgin, J-L Gardies and I Niiniluoto, Man, Law and Modern Forms of Life (D Riedel Publishing, 1985)

Zittrain, J, ‘Perfect enforcement on Tomorrow’s Internet’ in R Brownsword and K Yeung (eds), Regulating Technologies (Hart Publishing, 2008)

Journal Articles

Alexy, R, ‘Constitutional Rights and Proportionality’ (2014) 22 Revus 51

Alexy, R, ‘On Constitutional Rights to Protection’ (2009) 3 Legisprudence 1

Alexy, R, ‘Constitutional Rights, Balancing and Rationality’ (2003) 16(2) Ratio Iuris 131

Alger, GW, ‘Sensational Journalism and the Law’ (1903) 11 The American Lawyer 237

Bendiek, A, ‘Due diligence in cyberspace: guidelines for international and European cyber policy and cybersecurity policy’ (SWP [Stiftung Wissenschaft und Politik] Research Paper 7/2016) <http://nbn-resolving.de/urn:nbn:de:0168-ssoar-47152-8>

Berejka, M, ‘A Case for Government Promoted Multi-Stakeholderism’ (2012) 10 Journal on Telecommunications and High Technology Law 1

Berman, PS, ‘Cyberspace and the State Action Debate: The Cultural Value of Applying Constitutional Norms to “Private” Regulation’ (2000) 71(4) University of Colorado Law Review 1263

Bix, B, ‘On the Dividing Line Between Natural Law Theory and Legal Positivism’ (1999–2000) 75 Notre Dame Law Review 1613

Bogdan, M, ‘Dataflykt over gränserna och den svenska datalagstiftningen’ (1978) Svensk Juristtidning 1

Brenner, S, ‘Cyber-threats and the Limits of Bureaucratic Control’ (2013) 14(1) Minnesota Journal of Law, Science and Technology 148

Briggs, A, ‘The Principle of Comity in Private International Law’ (2012) 354 Recueil des Cours 65

Brkan, M, ‘Data protection and European private international law: observing a bull in a China shop’ (2015) 5(4) International Data Privacy Law 257

Buxbaum, HL, ‘Territory, Territoriality, and the Resolution of Jurisdictional Conflict’ (2009) 57 American Journal of Comparative Law 631

Bygrave, L, ‘Information Concepts in Law: Generic Dreams and Definitional Daylight’ (2015) 35(1) Oxford Journal of Legal Studies 91

Chilton, AS, ‘A Reply to Dworkin’s New Theory of International Law’ (2013) 80 University of Chicago Law Review Dialogue 105

Christo, ED, ‘Data Protection in Trinidad and Tobago’ (2013) 3(3) International Data Privacy Law 202

Cormack, A, ‘Can CSIRTs Lawfully Scan for Vulnerabilities?’ (2014) 11(3) SCRIPTed 308

Corn, GS, ‘Geography of Armed Conflict: Why it is a Mistake to Fish for the Red Herring’ (2013) 89 International Law Studies 77

Danca, D, ‘Cyber Diplomacy – A New Component of Foreign Policy’ (2015) 3 Journal of Law and Administrative Science 91

DeVos, SA, ‘The Google-NSA Alliance: Developing Cybersecurity Policy at Internet Speed’ (2014) 21 Fordham Intellectual Property, Media and Entertainment Law Journal 173

Diggelmann, O and MN Cleis, ‘How the Right to Privacy Became a Human Right’ (2014) 14 Human Rights Law Review 441

Doernberg, DL, ‘Sovereignty in the Age of Twitter’ (2010) 55 Villanova Law Review 832

Dworkin, R, ‘A New Philosophy for International Law’ (2013) 41 Philosophy and Public Affairs 2

Dworkin, R, ‘No Right Answer?’ (1978) 53(1) New York University Law Review 1

Dworkin, R, ‘Non-Neutral Principles’ (1974) 71(14) The Journal of Philosophy 491

Easterbrook, FH, ‘Cyberspace and the Law of the Horse’ (1996) The University of Chicago Legal Forum 207

Fletcher, GP, ‘Human Dignity as a Constitutional Value’ (1984) 22 University of West Ontario Law Review 178

Fredland, J, ‘Building a Better Cybersecurity Act: Empowering the Executive Branch Against Cybersecurity Emergencies’ (2010) 206 Military Law Review 12

Gable, K, ‘Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent’ (2010) 43 Vanderbilt Journal of Transnational Law 99

Garraway, CHC, ‘State Intelligence Gathering: Conflict of Laws’ (2006–2007) 28 Michigan Journal of International Law 575

George, RP, ‘A Defense of the New Natural Law Theory’ (1996) 41 The American Journal of Jurisprudence 47

Gerber, DJ, ‘Beyond Balancing: International Law Restraints on the Reach of National Laws’ (1984) 10 Yale Journal of International Law 185

Gerlach, C, ‘The Wannsee Conference, the Fate of German Jews, and Hitler’s Decision in Principle to Exterminate All European Jews’ (1998) 70(4) The Journal of Modern History 759

Giblin, R, ‘Evaluating Graduated Response’ (2014) 37(2) Columbia Journal of Law & the Arts 184

Ginsburg, T, ‘Comment on Svantesson, A New Jurisprudential Framework for Jurisdiction’ (2015) 109 American Journal of International Law Unbound 86

Goldsmith, J, ‘Against Cyberanarchy’ (1999) 65 The University of Chicago Law Review 1199

Gonzales, AG, ‘eBay Law: The legal implications of the C2C electronic commerce model’ (2003) 19(6) Computer Law & Security Report 468

Greenberg, J and AR Shalit, ‘New Horizons for Human Rights: European Conventions, Court and Commission of Human Rights’ (1963) 63 Columbia Law Review 1384

Greenleaf, G, ‘South Korea’s innovations in data privacy principles: Asian comparisons’ (2014) 30 Computer Law & Security Review 492

Greenleaf, G, ‘An Endnote on Regulating Cyberspace: Architecture vs Law?’ (1998) 21(2) University of New South Wales Law Journal 593

Groemminger, BK, ‘Personal Privacy on the Internet: Should It Be a Cyberspace Entitlement?’ (2003) 36 Indiana Law Review 827

Habermas, J, ‘Between Facts and Norms: An Author’s Reflections’ (1998–1999) 76 Denver University Law Review 1998

Healey, J, ‘The spectrum of National Responsibility for Cyber Attacks’ (2001) 18(1) The Brown Journal of World Affairs 63

Hestermeyer, HP, ‘Invalidity of ICANN's UDRP under National Law’ (2002) 3 Minnesota Intellectual Property Review 1

Hitchcock, H, ‘The Inviolability of Telegrams’ (1879–1880) 5 Southern Law Review 473

Hopkins, AT, ‘The Right to be Online: Europe’s Recognition of Due Process and Proportionality Requirements in Cases of Individual Internet Disconnections’ (2011) 17 Columbia Journal of European Law 557

Hricik, D, ‘Reading Too Much Into Nothing: The Metaphor of Place and the Internet’ (2003–2004) 55 Mercer Law Review 859

Hugenholtz, B, ‘Code as Code, Or the End of Intellectual Property as We Know It’ (1999) 6(3) Maastricht Journal of European & Competition Law 308

‘Introductory Comment to the Harvard Draft Convention on Jurisdiction with Respect to Crime 1935’ (1935) 29 Supplement American Journal of International Law 443

Irion, K, ‘Government Cloud Computing and National Data Sovereignty’ (2012) 4(3–4) Policy and Internet 40

Jenks, DA, MT Costelloe and CP Krebs, ‘After the Fall: Czech Police in a post-Communist Era’ (2003) 13 International Criminal Justice Review 90

Jew, B, ‘Cyber Jurisdiction – Emerging Issues & Conflict of Law when Overseas Courts Challenge Your Web’ (1998) Computers and Law 24

Johnson, D and D Post, ‘Law and Borders – The Rise of Law in Cyberspace’ (1996) 48 Stanford Law Review 1367

Juenger, FK, ‘American and European Conflicts Law’ (1982) 30 American Journal of Comparative Law 117

Kant, I, ‘The Universal Principle of Right: The Laws of Freedom as Moral, Judicial and Ethical’ (1914–1915) 9(3) Illinois Law Review 574

Kastenberg, JE, ‘Non-Intervention and Neutrality in Cyberspace: An Emerging Principle in the National Practice of International Law’ (2009) 64 Air Force Law Review 43

Kelsen, H, ‘Sovereignty and International Law’ (1960) 48(4) Georgetown Law Journal 627

Kelsen, H, ‘Law, State and Justice in the Pure Theory of Law’ (1947–1948) 57 Yale Law Journal 382

Kelsen, H, ‘The Pure Theory of Law and Analytical Jurisprudence’ (1941–1942) 55 Harvard Law Review 44

Kerr, I and J McGill, ‘Emanations, Snoop Dogs and Reasonable Expectations of Privacy’ (2007) 52 Criminal Law Quarterly 392

Kobayashi, BH, ‘An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods’ (2006) 14 Supreme Court Economic Review 261

Koops, B, ‘The trouble with European data protection law’ (2014) 4(4) International Data Privacy Law 250

Koops, B-J, BC Newell, T Timan, I  korvánek, T Chokrevski and M Gali|$$|Ahc, ‘A Typology of Privacy’ (Tilburg Law School Legal Studies Research Paper Series No 09/2016) <http://ssrn.com/abstract=2754043>

Kranenborg, H, ‘Google and the right to be forgotten’ (2015) European Data Protection Law Review 1 [pre-print version] <www.lexxion.de/images/pdf/Note_on_Google_Kranenborg_Endversion.pdf>

Kuner, C, ‘Data Protection Law and International Jurisdiction on the Internet (Part 2)’ (2010) 18(3) International Journal of Law and Information Technology 227

Lando, O, ‘The Lex Mercatoria in International Commercial Arbitration’ (1985) 34(4) International and Comparative Law Quarterly 747

Lessig, L, ‘The Law of the Horse: What Cyberlaw Might Teach’ (1999) 113 Harvard Law Review 501

Levitin, AJ, ‘The Merchant-Bank Struggle for Control of Payment Systems’ (2006) 17 Journal of Financial Transformation 73

Lindsay, D, ‘The “Right to be Forgotten” by search Engines under Data Privacy Law: A Legal Analysis of the Costeja Ruling’ (2014) 6(2) Journal of Media Law 159

Lorenzen, EG, ‘Territoriality, Public Policy and the Conflict of Laws’ (1923) 33 Yale Law Journal 736

Lowell, AL, ‘The Limits of Sovereignty’ (1888–1889) 2 Harvard Law Review 70

MacDonald, DA and CM Streatfeild, ‘Personal Data Privacy and the WTO’ (2014) 36 Houston Journal of International Law 625

Mann, FA, ‘The Doctrine of International Jurisdiction Revisited After Twenty Years’ (1984) 186 Recueil des Cours 9

Mann, RJ, ‘Regulating Internet Payment Intermediaries’ (University of Texas Law, Public Law Research Paper No 54 and University of Texas Law, Law and Econ Research Paper No 007) <http://ssrn.com/abstract=446420>

Mara, A, ‘Norm Origin and Development in Cyberspace: Models of Cybernorm Evolution’ (2000) 78(1) Washington University Law Quarterly 75

Matwyshyn, AM, ‘Of Nodes and Power Laws: A Network Theory Approach to Internet Jurisdiction Through Data Privacy’ (2003–2004) 98 Northwestern University Law Review 493

McCrudden, C, ‘Human Dignity and Judicial Interpretation of Human Rights’ (2008) 19(4) The European Journal of International Law 655

McGeady, S, ‘The Digital Reformation: Total Freedom, Risk and Responsibility’ (1996) 10(1) Harvard Journal of Law and Technology 137

Mefford, A, ‘Lex Informatica: Foundations of Law on the Internet’ (1997) 5(1) Indiana Journal of Global Legal Studies 211

Menthe, DC, ‘Jurisdiction in Cyberspace: A Theory of International Spaces’ (1998) 69(4) Michigan Telecommunications and Technology Law Review 69

Mills, A, ‘Rethinking Jurisdiction in International Law’ (2014) 84 British Year Book of International Law 187

Moore, S, ‘Cyber Attacks and the Beginnings of an International Cyber Treaty’ (2013) 34 North Carolina Journal of International Law and Commercial Regulation 250

Moshell, R, ‘… And Then There Was One: The Outlook for a Self-Regulatory United States amidst a Global Trend toward Comprehensive Data Protection’ (2004–2005) 37 Texas Tech Law Review 357

Mudrinich, EM, ‘Cyber 3.0.: The Department of Defense Strategy for Operating in Cyberspace and the Attribution Problem’ (2012) 68 The Air Force Law Review 167

Nagan, WP, ‘Conflicts Theory in Conflict: A Systematic Appraisal of Traditional and Contemporary Theories’ (1981–1982) 3 Journal of International and Comparative Law 343

Nhan, J and BA Carroll, ‘The Offline Defense of the Internet: An Examination of the Electronic Frontier Foundation’ (2011–2012) 15 SMU Science and Technology Law Review 389

O’Brien, D, ‘The Right of Privacy’ (1902) 2(7) Columbia Law Review 437

O’Connell, ME, ‘Cyber Security without Cyber War’ (2012) 17 Journal of Conflict & Security Law 187

Ortner, D, ‘Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime’ (2015) Brigham Young University Law Review 177

Osula, A, ‘Mutual Legal Assistance & Other Mechanisms for Accessing Extraterritorially Located Data’ (2015) 9 Masaryk University Journal of Law & Technology 43

Park, GK, ‘Granting an Automatic Authorisation for Military Response: Protecting National Critical Infrastructure from Cyberattack’ (2012–2013) 38(2) Brook Journal of International Law 797

Paulson, S, ‘Statutory Positivism’ (2007) 1(1) Legisprudence 1

Perritt Jr, HH, ‘The Internet is Changing the Public International Law System’ (2000) 88 Kentucky Law Review 885 <www.kentlaw.edu/cyberlaw/perrittnetchg.html>

Perritt Jr, HH, ‘Cyberspace and State Sovereignty’ (1997) 3 Journal of International Legal Studies 157

Perritt Jr, HH, ‘Cyberspace Self-Government: Town Hall Democracy or Rediscovered Royalism’ (1997) 12(2) Berkeley Technology Law Journal 476

Polčák, R, ‘Getting European data protection off the ground’ (2014) 4(4) International Data Privacy Law 282

Post, DG, ‘Against “Against Cyberanarchy”’ (2002) 17(1) Berkeley Technology Law Journal 1

Prescott, JM, ‘The Law of Armed Conflict and the Responsible Cyber Commander’ (2013) 38 Vermont Law Review 103

Radbruch, G, ‘Statutory Lawlessness and Supra-Statutory Law’ (1946) 26(1) The Oxford Journal of Legal Studies 1 (B Litchevski Paulson and S Paulson trans)

Reidenberg, JR, ‘Lex Informatica: The Formulation of Information Policy Rules through Technology’ (1998) 76(3) Texas Law Review 553

Rorty, R, ‘The Banality of Pragmatism and the Poetry of Justice’ (1989–1990) 63 Southern California Law Review 1811

Sartor, G, ‘The right to be forgotten: balancing interests in the flux of time’ (2015) International Journal of Law and Information Technology Online <http://ijlit.oxfordjournals.org/content/early/2015/11/25/ijlit.eav017>

Schauer, F, ‘Formalism’ (1988) 97 Yale Law Journal 509

Scheuermann, L and G Taylor, ‘Netiquette’ (1997) 7(4) Internet Research 269

Schmidt, A, ‘Radbruch in Cyberspace: About Law-System Quality and ICT Innovation’ (2009) 3(2) Masaryk University Journal of Law and Technology 195

Schmitt, MN, ‘In Defense of Due Diligence in Cyberspace’ (2015) 125 Yale Law Journal Forum 68 <https://ssrn.com/abstract=2622077>

Schultz, T, ‘Carving up the Internet: Jurisdiction, Legal Orders, and the Private/Public International Law Interface’ (2008) 19(4) The European Journal of International Law 838

Schultz, T and J Mitchenson, ‘Navigating Sovereignty and Transnational Commercial Law: The Use of Comity by Australian Courts’ (2016) 12(2) Journal of Private International Law 344

Schwartz, PM, ‘Privacy and Democracy in Cyberspace’ (1999) 52 Vanderbilt Law Review 1609

Scott, J, ‘The New EU “Extraterritoriality”’ (2014) 51 Common Market Law Review 1343

Senz, D and H Charlesworth, ‘Building Blocks: Australia’s Response to Foreign Extraterritorial Legislation’ (2001) 2 Melbourne Journal of International Law 69

Shackelford, SJ and RB Andres, ‘State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem’ (2010–2011) 42 Georgetown Journal of International Law 991

Shackleford, SJ and A Kastelic, ‘Toward a State-Centric Cyber-Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity’ (2015) 18 New York University Journal of Legislation and Public Policy 895

Sidhu, DS, ‘The Chilling Effect of Government Surveillance Programs on the Use of the Internet by Muslim-Americans’ (2011) 7 University of Maryland Law Journal of Race, Religion, Gender and Class 375

Solove, D, ‘Conceptualising Privacy’ (2002) 90 California Law Review 1087

Steinberg, RH, ‘Who Is Sovereign?’ (2004) 40 Stanford Journal of International Law 330

Strauss, S, ‘Darfur and the Genocide Debate’ (2005) 84 Foreign Affaires 123

Sulmasy, G and J Yoo, ‘Counterintuitive: Intelligence Operations and International Law’ (2006–2007) 28 Michigan Journal of International Law 625

Svantesson, D, ‘Against against Data Exceptionalism’ (2016) 10(2) Masaryk University Journal of Law and Technology 200

Svantesson, D, ‘Cross-border data transfers after the CJEU’s Safe Harbour Decision – A tale of Gordian Knots’ (2016) 41(1) Alternative Law Journal 39

Svantesson, D, ‘Jurisdiction in 3D – “scope of (remedial) jurisdiction” as a third dimension of jurisdiction’ (2016) 12(1) Journal of Private International Law 60

Svantesson, D, ‘A Jurisprudential Justification for Extraterritoriality in (Private) International Law’ (2015) 13(2) Santa Clara Journal of International Law 517

Svantesson, D, ‘A New Jurisprudential Framework for Jurisdiction: Beyond the Harvard Draft’ (2015) 109 American Journal of International Law Unbound 69 <www.asil.org/blogs/new-jurisprudential-framework-jurisdiction-beyond-harvard-draft>

Svantesson, D, ‘Extraterritoriality and targeting in EU data privacy law: the weak spot undermining the regulation’ (2015) 5(4) International Data Privacy Law 226

Svantesson, D, ‘Limitless borderless forgetfulness? Limiting the geographical reach of the “right to be forgotten”’ (2015) 2(2) Oslo Law Review 116

Svantesson, D, ‘The holy trinity of legal fictions undermining the application of law to the global Internet’ (2015) 23(3) International Journal of Law and Information Technology 219

Svantesson, D, ‘The (uncertain) future of online data privacy’ (2015) 9(1) Masaryk University Journal of Law and Technology 129

Svantesson, D, ‘What is “Law”, if “the Law” is Not Something That “Is”? A Modest Contribution to a Major Question’ (September 2013) 26(3) Ratio Juris 456

Svantesson, D, ‘Celebrating 20 years of WWW – a reflection on the concept of jurisdiction’ (2012) 6(1) Masaryk University Journal of Law and Technology 177

Svantesson, D and L van Zwieten, ‘Law enforcement access to evidence via direct contact with cloud providers – identifying the contours of a solution’ (2016) 32 Computer Law & Security Review 671

Tzanou, M, ‘Data protection as a fundamental right next to privacy? “Reconstructing” a not so new right’ (2013) 3(2) International Data Privacy Law 88

Van Alsenoy, B and M Koekkoek, ‘Internet and jurisdiction after Google Spain: the extraterritorial reach of the “right to be delisted”’ (2015) 5 International Data Privacy Law 105

Van Alsenoy, B and M Koekkoek, ‘The Extra-Territorial Reach of the EU’s “Right to Be Forgotten”’ (19 January 2015, ICRI Research Paper 20) 27 <http://ssrn.com/abstract=2551838>

Verdross, A, ‘Zum Problem der Rechtsunterworfenheit des Gesetzgebers’ (1916) 45 Juristische Blätter 471 and 483

Ware, S, ‘Domain-Name Arbitration in the Arbitration-Law Context: Consent to, and Fairness in, the UDRP’ (2002) 6 Journal of Small and Emerging Business Law 129

Warren, SD and LD Brandeis, ‘The Right to Privacy’ (1890) 4(5) Harvard Law Review 193

Waxman, MC, ‘Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)’ (2011) 36 The Yale Journal of International Law 421

Weissbrodt, D, ‘Cyber-Conflict, Cyber-Crime, and Cyber-Espionage’ (2013) 22(2) Minnesota Journal of International Law 347

Winn, P, ‘Katz and the Origins of the “Reasonable Expectation of Privacy” Test’ (2009) 40 McGeorge Law Review 1

Woods, AK, ‘Against Data Exceptionalism’ (2016) 68 Stanford Law Review 729

Yntema, HE, ‘The Historic Bases of Private International Law’ (1953) 2 American Journal of Comparative Law 297

Zeno-Zencovich, V, ‘Around the CJEU Schrems Decision: Digital Sovereignty and International Governance of Telecommunication Networks’ (2 June 2016) <http://ssrn.com/abstract=2788789> or <http://dx.doi.org/10.2139/ssrn.2788789>

Conference/Working Papers/Speeches

Gonzales, AG, ‘PayPal and eBay: The legal implications of the C2C electronic commerce model’ (paper presented at the 18th BILETA Conference, Controlling Information in the Online Environment, London, 2003)

Hughes, J, ‘The Internet and the Persistence of Law’ (paper presented at the Boston College Conference on Intellectual Property, E-Commerce and the Internet, Boston, Massachusetts, 2002) <www.ssrn.com/abstract_id=370380>

Kent, G, ‘Sharing Investigation Specific Data with Law Enforcement – An International Approach’ (Stanford Public Law Working Paper, 14 February 2014) <http://ssrn.com/abstract=2472413 orhttp://dx.doi.org/10.2139/ssrn.2472413>

Reding, V, ‘The EU data protection Regulation: Promoting technological innovation and safeguarding citizens’ rights – Intervention at the Justice Council’ (speech delivered at the Intervention at the Justice Council, Brussels, Belgium, 4 March 2014) <http://europa.eu/rapid/press-release_SPEECH-14-175_en.htm>

Webach, K, ‘Digital Tornado: The Internet and Telecommunications Policy’ (Working paper of the Federal Communications Commission, 1997)

Reports

Article 29 Data Protection Working Party, ‘Guidelines on the implementation of the Court of Justice of the European Union judgment on “Google Spain and Inc. v Agencia Española de Protección de Datos (AEPD) and Mario Costeja González” – C-131/12’ (2014) WP225

Council of Europe, T-CY Cloud Evidence Group, Criminal justice access to data in the cloud: Recommendations for consideration by the T-CY [TCY(2016)5] (16 September 2016) <http://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016806a495e>

Council of the European Union, ‘Council conclusions on improving criminal justice in cyberspace’ (9 June 2016) <www.consilium.europa.eu/en/meetings/jha/2016/06/cyberspace–en_pdf/>

Intelligence Community Assessment, ‘Assessing Russian Activities and Intentions in Recent US Elections’ (ICA 2017-01D, 6 January 2017) <www.dni.gov/files/documents/ICA_2017_01.pdf>

International Law Assessment, ‘Second Report by the ILA Study Group on Due Diligence in International Law’ (July 2016)

PHAEDRA [Improving Practical and Helpful Cooperation Between Data Protection Authorities] II, ‘Cooperation among data privacy supervisory authorities by analogy: lessons from parallel European Mechanisms’ (16 April 2016) <www.phaedra-project.eu/wp-content/uploads/PHAEDRA2_D21_final_20160416.pdf>

Internet Materials

Barlow, JP, A Declaration of Independence of Cyberspace (8 February 1996) Electronic Frontier Foundation

Clarke, R, Information Wants to be Free (24 February 2000) Roger Clarke’s Website <www.rogerclarke.com/II/IWtbF.html>

Council conclusions on improving criminal justice in cyberspace, Luxembourg, 9 June 2016 <www.consilium.europa.eu/en/home/>

Daskal, J and AK Woods, ‘Cross-Border Data Requests: A Proposed Framework’ (24 November 2015) Lawfare <https://lawfareblog.com/cross-border-data-requests-proposed-framework>

European Commission, ‘Myth-Busting: The Court of Justice of the EU and the “Right to be Forgotten”’ <http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_rtbf_mythbusting_en.pdf>

‘EU-US Privacy Shield Framework’ <www.privacyshield.gov/EU-US-Framework>

Fleischer, P, ‘Response to the Questionnaire addressed to Search Engines by the Article 29 Working Party regarding the implementation of the CJEU judgment on the “right to be forgotten”’ (31 July 2014) <https://docs.google.com/file/d/0B8syaai6SSfiT0EwRUFyOENqR3M/view?pli=1&sle=true>

Goar, C, ‘Goar: Harper is cutting off “lifeblood of democracy”’ (23 February 2011) The Star (Toronto, online) <www.thestar.com/opinion/editorialopinion/2011/02/23/goar_harper_is_cutting_off_lifeblood_of_democracy.html>

Hollister, S, ‘Dear tech companies: Stop shipping unfinished shit’ (28 December 2016) <www.cnet.com/au/news/stop-shipping-unfinished-products/>

Horten, M, ‘HADOPI Turns Three – Bon Anniversaire?’ London School of Economics Media Policy Project Blog (14 October 2013) <http://blogs.lse.ac.uk/mediapolicyproject/2013/10/14/hadopi-turns-three-bon-anniversaire/>

ILA, ‘Non-State Actors (2005–2016)’ <www.ila-hq.org/en/committees/index.cfm/cid/1023>

Information Wants to be Free (22 October 2016) Wikipedia <https://en.wikipedia.org/wiki/Information_wants_to_be_free>

Kravets, D, ‘An Intentional Mistake: The Anatomy of Google’s Wi-Fi Sniffing Debacle’ (2 May 2012) Wired <www.wired.com/2012/05/google-wifi-fcc-investigation/>

Macaskill, E and G Dance, ‘NSA Files Decoded: What the Revelations Mean for You’ (1 November 2013) The Guardian (online) <www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded>

Pierce, A and A Hough, ‘Keith Floyd died hours after lunch to celebrate cancer all-clear’ (16 September 2009) The Telegraph (UK, online) <www.telegraph.co.uk/foodanddrink/foodanddrinknews/6193862/Keith-Floyd-died-hours-after-lunch-to-celebrate-cancer-all-clear.html>

Powles, J, ‘Results May Vary: Border disputes on the frontlines of the “right to be forgotten”’ (25 February 2015) <www.slate.com/articles/technology/future_tense/2015/02/google_and_the_right_to_be_forgotten_should_delisting_be_global_or_local.html>

Svantesson, D, ‘Investigative Jurisdiction’ (1 June 2015) LinkedIn <www.linkedin.com/pulse/investigative-jurisdiction-dan-jerker-b-svantesson>

Svantesson, D, ‘A doctrine of “market sovereignty” to solve international law issues on the Internet?’ (5 April 2014) OUP Blog <http://blog.oup.com/2014/04/market-sovereignty-international-law-internet/>

UK-US bilateral agreement draft legislation proposed to US Congress of 15 July 2016 <www.netcaucus.org/wp-content/uploads/2016-7-15-US-UK-Legislative-Proposal-to-Hill.pdf>